Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Apparatus and method for enhancing the protection of media content

Inactive Publication Date: 2009-03-05
AMERICAN TELEPHONE & TELEGRAPH CO
View PDF7 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0010]The means for deterring access to the ACT may involve constructing the ACT to make it virtually impossible to gain access to its stored data without disabling it sufficiently so as to render access to the data very difficult or virtually impossible. In one embodiment, the ACT is made difficult to access by making it so small that a hacker will find it difficult to effectively tap into its circuitry. Difficulty of access to the ACT may also be enhanced by sealing the ACT, only exposing the communication interface. In another embodiment, the ACT can be manufactured to break when an attempt is made to access the interior of the ACT. Alternatively, the ACT can be manufactured so that when it breaks the non-volatile memory that is stored on it, including any keys stored in the memory or elsewhere in the ACT, is automatically erased. By combining two or more of these features, the security provided by the ACT is even further enhanced.
[0011]In a further embodiment of the ACT, it is directly attached to a secure system-on-a-chip (SOC), the SOC in turn being directly linked to a computer. An SOC, when attached to an ACT, adds to the functionality of the ACT in at least the following ways. After the proper authorization is transmitted to the ACT by the SOC, such as presenting the ACT with player keys, the SOC receives the title keys from the ACT. The SOC uses these title keys to decrypt encrypted media content. To improve the decryption step, the SOC may have an input interface with a speed of at least approximately the frame rate of the encrypted media content, such as a video. Additionally, the SOC may have an output interface with a speed of at least approximately the pixel rate of the decrypted, uncompressed media content.
[0013]Currently, when the media content is decrypted and uncompressed within a computer, a set-top box, or a stand-alone player, the decrypted and uncompressed media content is transferred to the display using HDMI—a standard that is used to transmit data between the player and the display. HDCP is the encryption protocol used for transferring this uncompressed media content from the player to the display. Unfortunately, HDCP is not as secure as is needed for insuring secure transfer of the encrypted media content to the display. The media content encrypted with this weak encryption protocol can be intercepted and decrypted without much difficulty. Therefore, the second and third of the exemplary embodiments—directly attaching the ACT to the media content display while the SOC is directly linked with the computer, or directly attaching the ACT to the SOC and directly attaching the SOC to the media content display—are advantageous because they allow for the media content to be more securely sent to the media content display.
[0014]The second embodiment of the ACT and SOC system involves the SOC being directly linked within a computer, set-top box, or stand-alone player, while the ACT is in communication with the SOC, but is directly attached to the means for displaying the media content, such as a monitor for displaying media content. In the third embodiment, the ACT can be directly attached to the SOC while the SOC is directly attached to the means for displaying the media content. What both of these embodiments address is the weak link in the transfer of decrypted media content from a media content player to a media content display. Each of these embodiments enables the transmission of strongly encrypted or re-encrypted media content to the media content display—where it is securely decrypted by the powerful ACT-SOC system—thereby more effectively protecting the media content during its transmission from the computer, set-top box or stand-alone player to the media content display.
[0016]Some specific aspects of this embodiment are now introduced. First, multiple providers can have their title keys stored simultaneously within the ACT. Currently set-top boxes are given to a user by a single provider, and only that provider is able to store its title keys on the set-top box. Second, with the ACT able to maintain the security of the title keys stored on it—whether encrypted or decrypted—even over extended periods of time, the sending of the title keys can be decoupled from the sending of the encrypted media content. The title keys can even be sent to the user's media content player or users media content display well in advance of the user receiving the encrypted media content. Also, the title keys can be held securely on the ACT and used multiple times. This gives added flexibility to the business relationship that can be established between the user and the media content provider. These options of sending the keys well in advance of the user playing the media content and keeping the keys for multiple uses are risky options with current computer processor models because, currently, the computer has no place to securely store the title keys. Therefore, currently the media content provider most often sends the keys as close as possible in time to the user's playing of the media content in order to minimize the length of time during which the title keys—once decrypted—are in the computer's memory. Likewise, in current systems, soon after the media content is decrypted with the decrypted title keys, these title keys are ideally erased in order to avoid a hacker from getting access to them. As explained, the current invention enables separating in time the transmission of the keys from the transmission of the media content.

Problems solved by technology

The means for deterring access to the ACT may involve constructing the ACT to make it virtually impossible to gain access to its stored data without disabling it sufficiently so as to render access to the data very difficult or virtually impossible.
In one embodiment, the ACT is made difficult to access by making it so small that a hacker will find it difficult to effectively tap into its circuitry.
Difficulty of access to the ACT may also be enhanced by sealing the ACT, only exposing the communication interface.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method for enhancing the protection of media content
  • Apparatus and method for enhancing the protection of media content
  • Apparatus and method for enhancing the protection of media content

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028]Providers of proprietary digital media content need to guard the rights of their media content and prevent it from being freely copied. Therefore, such providers seek a way to limit those who can read the media content and even further to limit those who can copy the media content. While these goals are shared by most providers of mass-produced digital media content, achieving these goals has proven to be quite elusive. One strategy has been to encrypt the media content, thus rendering it unreadable and / or uncopyable without the appropriate “keys” for decryption. A key is defined herein as a piece of metadata that is needed to decrypt an encrypted piece of data into a form that is readable without further decryption. By encrypting the media content, a third-party such as a media content provider can control and limit access to the media content. Access is granted to a user by giving the user the needed keys for decryption.

[0029]Recently there has been an effort to formalize th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An aspect of the current invention involves an apparatus and method for protecting media content from being read and copied by an unauthorized party. In one embodiment of the invention, this is accomplished by storing keys for decrypting encrypted media content on a secure memory device located in proximity to a computer processor. A secure memory device located in proximity to a computer processor allows for decryption keys to be sent to a user of the computer processor in advance of the user receiving an encrypted media content that will be decrypted with the decryption keys. With the secure memory device, the decryption keys can be stored indefinitely without an unauthorized party gaining access to them. Another embodiment of the invention allows for multiple media content providers to store their own decryption keys for their own encrypted media content simultaneously on a secure memory device located with a user's personal computer. A further embodiment of the invention involves using a secure memory device located with a means for displaying media content—such as a monitor or speaker—to allow for secure transfer of decrypted, decompressed media content from a computer processor used to play media content, a stand-alone media content player, or a set-top box media content player to a media content display

Description

BACKGROUND OF THE INVENTION[0001]The present invention relates generally to media content, and more particularly to protecting media content. Media content, as referred to in this description, includes audio, video, or other types of content known to those in the art.[0002]Media content providers are in a continuing “arms race” with undesired third parties, generally referred to as hackers, who, without payment, want to gain access to, and copy, proprietary digital media content. One defense against attacks by hackers involves encrypting digital media content so that the content can only be read or copied by authorized equipment or users. Such protected content is referred to herein as encrypted media content. To date, most mass-produced digital media content have been produced with some type of protection that permits the content to be read and / or copied only by those who have been so authorized. However, although prior art digital media content such as DVDs were indeed encrypted t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N7/167H04L9/00
CPCG06F3/14G09G5/006H04N7/163H04N7/1675H04N21/4143H04N21/63345H04N21/42623H04N21/4334H04N21/4367H04N21/4405H04N21/4181
Inventor KILLIAN, THOMASRICE, CHRISTOPHER W.
Owner AMERICAN TELEPHONE & TELEGRAPH CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products